AD Domain ServicesDirectory Objects & Identity Data

Aging analysis of user accounts

Aging Analysis of User Accounts A first-principles approach to reducing access risk, cleaning identity sprawl, and improving audit readiness. What “aging analysis” means: Aging analysis is the practice of classifying user accounts by time-based signals (e.g., last sign-in, last password change, time since creation, and time since last entitlement…
Read more
AD Domain ServicesArchitecture & Design

Cleanup automation using Lepide/Netwrix insights

Cleanup Automation Using Lepide and Netwrix Insights “Cleanup” in Active Directory (and adjacent systems like file servers and M365) is rarely a one-time task. It’s an operating model: continuously detect what’s stale or risky, validate it, apply a controlled action, and prove you didn’t break anything. The easiest way to get this right is to turn audit and activity…
Read more
Detection EngineeringSecurity Operations for Identity

Detecting unmanaged accounts via group audit

Detecting unmanaged accounts via group audit: advanced comparison guide for AD, Entra, SIEM, and PAM Detecting unmanaged accounts via group audit means using group membership changes and “who got added where” telemetry to surface identities that operate outside expected governance: accounts not onboarded to PAM, not tied to HR/ITSM ownership, not covered by standard…
Read more
Identity Protection & RiskMicrosoft Entra ID

Risk-based lockout policy tuning

Risk-based lockout policy tuning: Cloud vs on-prem comparisons, deep mechanics, and technical implementation Risk-based lockout policy tuning is the practice of adjusting lockout behavior based on the assessed risk of an authentication attempt, rather than relying on a fixed “X failed passwords = lockout” rule. The goal is simple: slow attackers down hard while keeping…
Read more
AD Domain ServicesArchitecture & Design

Assign home folders dynamically with scripts

A user home folder sounds simple: “give each person a private network location and map it as H:”. In real environments, that “simple” choice becomes a long-running system: identity meets storage, permissions, audits, migrations, quotas, backups, and incident response. That is why assigning home folders dynamically with scripts is not just a convenience trick—it is a…
Read more